Computer Science ›› 2009, Vol. 36 ›› Issue (6): 75-77.
Previous Articles Next Articles
YAN De-qin ZHAO Hong-bo JIN Hong (Department of Computer Seienee,Liaoning Normal University,Dalian 116029,China)
Online:
Published:
Abstract: In the (t, n) threshold multi-secret sharing scheme, there are n participants in the system. At least t or more participants can easily pool their secrets shadows and reconstruct m secrets at the same time. He-Dawson proposed a multistage secret sharing b
Key words: Cryptosystem, Secret sharing, Multi-secret sharing, Threshold scheme
YAN De-qin ZHAO Hong-bo JIN Hong (Department of Computer Seienee,Liaoning Normal University,Dalian 116029,China). [J].Computer Science, 2009, 36(6): 75-77.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2009/V36/I6/75
Cited